SECTION A: SHORT QUESTIONS
QUESTION 1
Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2
Question 1
SECTION A: SHORT QUESTIONS
QUESTION 1
Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A t... show full transcript
Worked Solution & Example Answer:SECTION A: SHORT QUESTIONS
QUESTION 1
Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2
Step 1
1.1.1 The most common protocol used to send e-mail is known as ...
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The most common protocol used to send e-mail is known as SMTP (Simple Mail Transfer Protocol). SMTP is the standard for sending emails across networks.
Step 2
1.1.2 Which ONE of the following refers to an encryption process used to authenticate the identity of the sender of an e-mail message?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The process that refers to an encryption used to authenticate the identity of the sender of an e-mail message is a Digital Certificate. Digital certificates are used to confirm the identity of the sender.
Step 3
1.1.3 Which ONE of the following refers to a data structure that is non-volatile?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The data structure that is non-volatile is a Text File. Unlike volatile memory, text files maintain their data even when the power is turned off.
Step 4
1.2.1 Which of the above assignment statements will cause a compilation/syntax error?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The statements that cause compilation/syntax errors are (ii) and (iv). The second statement tries to assign a real value to an integer variable without proper casting, and the fourth is attempting to use mod on a real number.
Step 5
1.2.2 Determine the value of sAnswer after the execution of the statements below.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
After executing the assignment statements, the value of sAnswer will be IfnT. The copy function extracts 'Inf' based on the position found, and then 'T' is inserted into the second position.
Step 6
1.3.1 Web applications designed to deliver the functions and features of a traditional desktop application online.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
RIA (Rich Internet Applications). RIAs provide user interaction similar to that of desktop applications while running in a web environment.
Step 7
1.3.2 An type of information system that gathers, analyses and presents information for the management, operations and planning levels of an organization.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Decision Support System (DSS). DSS helps in processing data to assist in decision-making activities.
Step 8
1.3.3 Downloaded software that bombards the user with advertisements
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Adware. This software is designed to display advertisements on your computer.
Step 9
1.3.4 A remotely controlled network of zombie computers.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Botnet. A network of infected machines controlled remotely by an attacker.
Step 10
1.3.5 A type of memory that stores the BIOS settings.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
CMOS. This memory type retains BIOS settings when the computer is powered off.
Step 11
1.3.6 Testing the accuracy of captured data by checking it against the source of the data.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data Verification. This process ensures that the data collected is accurate and reliable.
Step 12
1.3.7 Someone who gains unauthorized access to data in order to steal data or someone who makes unauthorised changes to data.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Black hat hacker/cracker. This term describes individuals who exploit computer systems for malicious purposes.
Step 13
1.3.8 Specialised hardware and software designed to be used at till points.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Point of Sale (POS) system. This system is used for sales transactions in a retail environment.
Step 14
1.3.9 E-mail sent to people that advertise products that are not relevant to them.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Spam. This comprises unsolicited emails typically intended for advertising.